Adding value through operational risk management

Size: px
Start display at page:

Download "Adding value through operational risk management"

Transcription

1 Adding value through operational risk management The modern art of banking security Answers for infrastructure.

2 A new dimension to banking security Two of the key drivers in the banking sector today are customer trust and operational efficiency. Customer trust is directly linked to a bank s ability to ensure business continuity and secure assets, people and sensitive data. Operational efficiency is achieved by redirecting payment transactions to lower-cost channels, changing the role of branches to focus on the customer experience, and streamlining processes and systems. These two drivers, in combination with stringent operational risk and compliance regulations, have led to security issues being increasingly viewed and managed as a single, end-to-end concern within a bank s risk management strategy. As a result, the modern approach to bank security is to look beyond the physical environment and incorporate IT systems, channel management, identity checks and access management into the overall security concept. At Siemens, we understand that the level of sophistication and functionality required from security systems is driven by the specific business role of bank premises, from ATM zones to local branches or data centres. The scalable products and systems we offer help customers and staff feel safe without interfering with daily business. Security products and systems from Siemens inter-operate seamlessly to support a more self-service and customer-friendly banking environment, for maximum operational efficiency and return on investment. 2

3 Banking on security with a holistic approach to risk management Maintaining customer trust To compete successfully in today s tough marketplace, financial institutions need to keep the trust of their customers a trust which relies not only on their capacity to deliver good value services, but also on their ability to protect people, assets, premises and the highly sensitive data they hold. Despite the increase in electronic fraud, a worrying trend iden tified by a recent EBF 1 report is the growing use of violence in physical raids. With any security breach potentially having devastating effects on a bank s reputation, security is understandably a growing priority and banks need to have and be seen to have adequate security measures. Protecting the new bank In addition, banks have diversified the range of services they offer and their delivery channels to improve both customer retention and acquisition: the simpler services are now available through lower- cost, self-service channels such as ATMs and online banking, whilst branches are refocused on more complex service sales, with open, customer-friendly spaces. Whilst this shift improves service levels and drives operational costs down, with this new bank business model come new threats, and the need therefore for a more holistic approach to security, where sales channels are no longer seen in isolation: security systems should not only encompass a bank s security as a whole protecting everything from a single ATM to branches, data centres and entire networks but also enable the exchange and cross referencing of security and transaction data across all bank channels. Ensuring business continuity Losses resulting from security breaches are not just monetary: collateral damages can also include compromised data, lost productivity and reduced turnover ultimately damaging a bank s credibility. Regula tory requirements such as Basel II 2 and Sarbanes-Oxley (SOX) also emphasise the need for banks to proactively protect business continuity and guard against operational risks 3 : interoperable security systems can help address these requirements, either by preventing attacks and business disruptions, or by speeding up incident recovery through e.g. the provision of tools to investigate and prosecute more effectively. Security with measurable return on investments (ROI) Siemens draws from over 30 years of secu rity know-how to deliver interope r- able systems which support a truly holistic approach to banking security: access control, intrusion detection and video surveillance systems work together to deliver the required functionality for given sales channels, enabling security resources to be deployed more costeffectively. Capable of integrating into existing IT networks, they can help reduce the initial level of investments, yet still make room for system upgrades or expansions. Powerful reporting tools, combined with the bank s transactional data, provide an enterprise view of potential security threats, improving both prevention and response capability: losses due to theft of cash, assets and sen sitive data are reduced as are threats to business continuity thereby providing measurable return on investment. Compliance with international standards International standards such as VDS and EN are vital in ensuring that electronic security systems are installed professionally and remain reliable. Siemens embraces this compliance in every way, with also for example, video surveillance systems that are Kalagate and BGV (UVV-Kassen) compliant. These ensure, amongst others, that evidence is admissible in court and that suspicious events can be saved separately and securely exported to various media. Highlights Develop cross-channel security intelligence to more effectively protect people, data, assets and premises Reduce losses to fraud, theft and vandalism Improve operational efficiency and business continuity with measurable ROI Increase compliance with operational risk management regulations Protect brand equity and customer trust 1 European Banking Federation 2 Within the Basel II accords, operational risk is now treated as a clear focus area, alongside credit and market risks. 3 The risk of loss resulting from inadequate or failed internal processes, people and systems, or from external events. (Basel II definition) 3

4 In a bid to improve customer convenience and shift payment transactions to lower-cost channels, banks have become increasingly self-service organisations, rolling out ATMs accessible 24/7 at branches or in remote areas (e.g. in the High Street, at petrol stations, supermarkets, transport terminals etc.). Indeed, not only have ATMs provided banks with a more cost-effective service delivery channel, but they are also a key channel through which banks can conduct powerful one-to-one marketing this is reflected in the ATM numbers, estimated to go over the 2 million mark worldwide by , and with nearly half of them deployed in off-site locations. The self-service bank brings its own security challenges, with a dramatically increased pool of potential and easier targets for card frauds, robberies, muggings, forced withdrawals or even ram raids Protecting the self-service bank Bank owned or sponsored stand-alone ATMs, 24-hour zones, ATM operator networks. The self-service security challenge Banks and financial institutions have a legal duty to prevent cardholders financial and personal information from being compromised or misused 2. They need to ensure that ATMs are safe to use and protected for malicious purposes (card skimming, credit/debit card fraud). Electronic security systems can help banks address these challenges, adding a useful layer of protection for the users, as well as at every step of the ATM management process from replenishment and maintenance to continuously monitored operation. Adequately tailored systems can even help banks optimise ATM cash flows and the level of capital they have tied to their vaults by reducing the security risks associated with keeping higher amounts of cash in ATMs. 4 Reducing fraud-related costs A high proportion of ATM-related fraud is estimated to be committed by organised crime and internal staff, and the cost of those incidents is getting higher for the industry. Beyond the cash losses, ATM security concerns have an increased effect on insurance premiums, which in turn impact directly on cash management costs. Implementing tighter security measures will reduce losses, and as a result insurance claims and premiums. Protect stand-alone ATMs As an increasing number of ATMs are being installed away from branches, speed of intervention is critical, making constant monitoring a key success factor in protecting them from vandalism, theft and electronic or mechanical tampering. This supports cost-effective and speedy event responses whilst also providing reassurance to lone users. Security systems from Siemens enable the simultaneous monitoring of many ATMs in real time from a single, central location. This gives ATM operators and banks more pro-activity for example taking an ATM offline immediately if suspicious activity is detected. Seismic detectors, when fitted to ATMs, will provide immediate and reliable detection of attacks on the enclosure without any false alarm being generated by passing traffic or by the vibrations generated by the ATM operation. With faster, more reliable alarms, speed of intervention is improved whilst the risk of damage to ATMs is reduced. An additional layer of security can be added through video surveillance systems acting both as a visual deterrent and providing useful evidential material for example with day/night cameras from Siemens linked to a SISTORE MX 3G digital recording system: live or recorded images can be tagged to alarms or ATM events, thereby documenting complete transactions a useful evidential feature in case of disputes regarding cash withdrawals. 24h services at branches The 24-hour availability of ATMs and deposit boxes inside branches calls for a minimum level of protection of both the users and the machines against theft and

5 Access control Intrusion detection Central controllers SiPass Entro The ATM zone functionality in SiPass Entro includes programming of card details and branch serial codes into the Entro software to enable door opening in 24h zones, as well as alarm control, Alarm Status Feedback (ASF) and SISTORE AX / Vectis HX DVR integration. All event logs are encrypted for data security and can be securely exported for reporting purposes. The system also offers access groups, time schedules and zone definable functionality (anti-passback and interlock) and a centrally held database. SPC5000 Can act as a local alarm system, or enco zones. Alarms can simultaneously trigg and be transmitted along with live vid centre for audio and video alarm verific vention. The system offers flexible, reli sion (e.g. IP and GPRS back-up) and can unset from the SiPass Entro access con facility. Special intrusion functions are ATM management in order to protect p Interoperability in action 24-hour ATM zone 06h00 The cash-in-transit (CIT) team arrives at the 24- hour ATM zone located on a busy high street, to proceed with cash replenishment ahead of the weekend. The ATM zone has its own local electronic security system, linked to an outsourced Alarm Receiving Centre (ARC). The CIT team enter using their personal card swiped at the reader at the entrance. Once inside, they block the door to prevent anyone from entering. All ATMs in the area (a mix of wall recess-mounted and free standing machines) are equipped with Intrunet seismic detectors. The motion detectors are automatically deactivated, at the same time triggering automatic recording via the SISTORE AX / Vectis HX digital recorder. Live video images are sent to the ARC to ensure any suspicious event during replenishment is acted upon immediately. 12h30 The bank s system which monitors all transactions made through the ATM network has flagged up an unusually high number of aborted transactions in the 24-hour zone. The ATM network manager contacts the ARC to access video footage from this location. The SISTORE AX / Vectis HX recorder directly interfaces to the ATM machines, enabling a quick access to events and search of the video footage related to these aborted transactions. Thanks to the recorded images the team identifies the same individual using the ATM on several occasions over the course of 2 hours. Glass break detector Seism Vandal resistant dome Entry/exit reader Access controller Control keypad Digi Field devices Swipe card readers Connected to a SiPass Entro system to control access to 24-hour zones. The system can be programmed to recognise card data, allowing or refusing entry to the ATM zone. Cash-in-transit services can be given a personal access card, with specific rights, which can be set to not unset the alarm system automatically. Instead, they would have to deactive the alarm using the alarm keypad, giving them the opportunity to enter a duress code and signal the alarm if forced to enter the ATM zone under duress. Motion detectors Used to monitor movement inside the ATM zone, and to detect any unautho r ised entry. With multi-criteria signal analysis for high immunity to false alarms, and advanced mirror technologies for superior detection. Easy snap-in installation concept for ease of installation and maintenance. Seismic detectors Positioned inside free standing ATM machines, directly in the wall structure near the machines or inside bollards positioned outside stand-alone ATMs. Alarms are triggered as soon as an attac is detected, whilst environmental vibrations passing traffic, ATM operational vibrations are reliably ignored. 5

6 Video surveillance Vectis HX mpass multiple ATM er video recording eo to a monitoring ation prior to interable alarm transmisautomatically be set/ trol system s scheduler available to support eople and values. Vectis HX has been designed and engineered with the next generation of hybrid technology in mind. By bridging the technological division between analog and IP surveillance capabilities, the Vectis HX has the ability to provide crisp, full HD display and has up to 8 or 16 IP Cameras. Vectis HX offers users a simple and cost-effective migration to IP video surveillance. The flexible design makes it suitable for a number of applications ranging from single system to multi-site requirements. ic detector Wide dynamic camera Dual technology detector The ATM is immediately taken off-line whilst investigation continues but remains under alarm and video surveillance the police are also informed so personnel can be dispatched to the location if required. 15h00 After review of the video footage, the police have confirmed that the individual caught on camera is a known repeat offender. A police patrol is dispatched on site to attempt arrest. tal recorder Control software: Interoperability System Control Software Intrusion Detection SiPass Entro Software Video Surveillance Access Control 22h10 The ARC receives an alarm originating from an ATM located at an unmanned petrol station. The ATM was sponsored by the same bank and is fitted with seismic detectors, which have now triggered an alarm. The area surrounding the ATM is also under video surveillance: day/night cameras are connected to the petrol station s Vectis HX digital recording system, which is programmed to record every time ATM transactions take place, or if an alarm is triggered. The ARC operator simultaneously accesses live video images and pre-alarm recorded images via the Vectis HX network viewing software to check the current situation on the site: There is damage to the wall on which the ATM is installed but by reviewing the pre-alarm recordings, he is able to establish that a car has reversed into the wall by accident and driven off. The ARC contacts the bank s ATM network manager so the ATM service provider can be called on site. Glass break detector The acoustic glass break detector is ideal for 24h zones with large glazed areas as they can be positioned up to 8.5 m away from the glass surface to be monitored, offering flexible positioning options. Door and window contacts Can be used to signify the opening of the door, simultaneously de-activating the PIR detectors inside the ATM zone, and triggering real-time recording from a Vectis HX. Cameras High-resolution models ensure detailed information is captured. Wide dynamic models for bright areas such as facing entrances to ATM zones, for clear images both inside and looking at the outside. Day/night models in conjunction with infrared illumination for clear images 24 hours a day. All our IP cameras are UVV Kassen certified. Vandal resistant domes Positioned at the entrance of 24-hour zones or above stand-alone ATMs, they will provide the crisp images required to investigate suspicious events. IP66 they can withstand a blow up to 1000 kg. TFT/LCD/LED Displays With various sizes of screen and performance of display suitable for in a control room or as public display monitors. k 6

7 ATM replenishments can be made safer through remote monitoring. tampering with video surveillance, an alarm system and a means of restricting access to legitimate customers. A DC800 controller, linked to an access reader on the door, can be used to read the bank card details and authorise or not entry to the 24h zone. Motion detectors, linked to an SPC intrusion system, are then deactivated once the entry is authorised, at the same time triggering automatic recording via a SISTORE AX/ Vectis HX (unless continuous recording is preferred). Through the use of IPbased video surveillance, the images can be transmitted back to a central control facility from where any suspicious activities can be monitored and investigated, either for an appropriate real-time response or for a follow-up in the event of an incident. Extend security to sponsored ATMs As financial institutions increasingly sponsor ATMs that are placed by independent commercial entities such as retailers or public transport organisations, ensuring adequate ATM security becomes a more complex challenge. However, banks can take best practices and due diligence a step further, by taking a more active role in ensuring that these ATMs benefit from the same level of protection as their own. A basic yet efficient system can start with seismic detectors, combined with a local SISTORE AX/ Vectis HX recording system, set to record continuously. Ensuring safe ATMs replenishment The increasing reliance on ATMs as a means of reducing operational costs has translated into the addition of more services obtainable through the machines, from cash remittance and deposits to mobile phone top-ups. Replenishment can therefore now take longer, moving from just cash-related operations to checking the ever more complex machine functions potentially giving more time and opportunity for robbery. Video surveillance systems from Siemens can be set to record on events, for example when the enclosure is open for replenishment or maintenance, with live images streamed over an IP network to a monitoring centre, giving added protection to the replenishment process and importantly, the staff undertaking this process. Reducing operational costs at ATMs Cash management is an essential part of managing the profitability of ATMs, and a difficult balancing act between optimal cash levels in ATMs and replenishment frequency and costs. However, as cash is better protected within ATMs, a more optimal amount of cash can be kept in the ATM itself, therefore reducing the risk of downtime and the number of (costly) replenishments. This can also have a posi tive impact on insurance costs, as better security translates into reduced claims and premiums. Security systems from Siemens also support remote services, reducing the need for costly on-site visits for upgrades or maintenance purposes. Tackling ATM ram-raids Ram-raids where an ATM is forcibly removed from its location to be broken into off-site are showing an upward trend, and are increasingly conducted by well-organised crime gangs. While basic precautions can be taken to prevent ramraids by using concrete bollards, bolting the machines to the floor and keeping ATMs away from doors and windows an alarm system incorporating seismic de-tectors will enable fast response and dispatch of intervention services. Coupled with video surveillance for evidence and investigation purposes, electronic security will increase the chance of catching the criminals and recovering the cash. Highlights Optimise ATM operational costs thanks to reduced losses to frauds/attacks, better cash levels management and reduced insurance premiums Protect ATM users at all times with video surveillance Reduce the risk of ATM fraud with seismic detectors against mechanical tampering Identify suspicious patterns across ATM networks with networked video surveillance and seismic detection Optimise the chance of successful investigation and prosecution through event-driven video recording with complete transaction audit trail 1 Source: ATM Industry Association (ATMIA) 2 Cf. Gramm-Leach-Bliley Act 7

8 As a bank s most central channel, the role of the local branch is changing to maximise customer interaction and increase the return on investment. This now tends to involve putting more staff in advisory and selling roles to push cross-selling, redesigning and standardising the physical space across branches (with the risk of making it much simpler for organised criminals to plan and target multiple branches of the same bank), and opening up the working environment. As a result, members of staff are less protected by physical barriers against attacks by abusive customers or robbers. Electronic security can help compensate for the reduction in physical barriers in the public areas by making it harder to gain access to sensitive assets or data and making it easier and less risky for staff to raise the alarm. For a more secure retail bank Post-offices, local branches, currency exchanges. For a safer proximity branch Achieving the right balance between the security of customers and staff on the one hand, and convenience and competitiveness on the other, is the challenge facing financial institutions today. Banks are generally more at risk of attack during quieter periods such as opening times when staff numbers are low and fewer customers are present. Apart from established bank security procedures, adopting other common sense practices such as limiting customer access, controlling staff access and locking interview rooms when not in use is fundamental to a more secure banking environment. Through training, staff should be encouraged to remain alert at all times and to be on the lookout for suspicious or unusual behaviour. With these types of basic practices in place, electronic systems are the effective final layer of security both during and outside business hours. 8 Improve risk containment in the branch Bank branches should be separated into zones with clearly defined risks and control levels (see graphic overleaf): Public (areas that all employees and customers can access), controlled (areas that can and must be locked when unattended) and very controlled (where access is restricted to authorised users). This can be achieved through a combination of physical barriers (such as air locks) and electronic security: an interoperating system of video surveillance, access control and intrusion detection in areas of high risk allows bank managers or security staff to view any area whenever an alarm is triggered or a door opened, therefore enabling them to check the visitor s authority and progress throughout the branch. This can be complemented by automatic video recording for evidential or investigation purposes. Protect staff at all times The increasing use of open-plan office design to build relationships with customers also puts staff at greater risk. But the risks are not limited to robbery. Personal finan ce is potentially an emotive subject which can sometimes escalate to violence again st staff. Video cameras from Siemens with wide dynamic technology will ensure crisp images even when facing a brightly-lit entrance, acting as a deterrent in the more public areas whilst providing useful evidential support should a prosecution follow any attack. Silent alarms at individual counters and in interview rooms, linked to a central monitoring centre or security room, will also provide valuable reassurance to staff and ensure immediate response to incidents. Secure executive homes The increase in the number of bank robberies where staff and their families are held hostage to gain access to the safe shows that implementing a security program which would encompass executive homes as part of the bank s own security system could also make the difference between early and appropriate intervention or successful robbery. An intrusion detection system incorporating silent alarms and triggering live video streaming to a monitoring station will ensure that no such situation goes unnoticed until it is too late, and will provide valuable support to police forces during the intervention phase.

9 Access control Intrusion detection Central controllers SiPass integrated This scalable system provides seamless role-based access control between the defined branch risk zones, e.g.: door interlocking enables the creation of man traps or airlocks between the public and mixed areas; with escort control, 2 valid cards must be presented at the door before it can be unlocked; Records of entries/exits enable visitors to be accounted for at all times; elevator control restricts access to staff-only floors. The system also offers powerful reporting tools. SPC 5000 With versatile alarm transmission mode local intrusion detection with remote m activation/deactivation on badging of a integrated) with simultaneous video re independent alarm actuation/settings f security zone based on risk scenarios an alarm triggered video recording/ transm alarm verification and simultaneous ac other areas. Special intrusion functions vault management in order to protect p Interoperability in action town centre branch Field devices 07h30, Monday morning The cash-in-transit van arrives with the internal mail and the amount of foreign currency pre-ordered for the day. Respecting the red/green traffic light system which indicates the integrity of the security systems, the security guards open the front door, drop sacks delivered and resecure the front door. Their arrival is recorded through external cameras linked to a SISTORE MX 3G digital recording system; their opening of the front door de-activates the SPC 5000 alarm system in the area, simultaneously triggering real-time video recording via internal cameras until the front door is resecured. Traffic light system again shows green to indicate all is well within branch, and the security system is fully reinstated. 08h00 The bank manager arrives alone and seeing green security light opens front door by badging his access card and entering his own PIN code using a SiPass Prox & PIN access reader. This deactivates the intruder alarm and the traffic light system. An audible alarm sounds, indicating that the alarm system in the safe and strong room is still armed. 08h30 While staff prepare for the day s business, two designated key holders access the safe area using their personal proximity card and PIN number, at the same time deactivating the motion detection system in the area. The safe s integrity is continuously monitored via seismic detectors, which can detect electronic/mechanical tampering. Proximity and PIN reader Robust design and metal casing design and metal casing for vandal resistance. Ideal for use at staff entrances. Models for indoor use also include a duress functionality. Smart card technology Enables physical access rights to be combined with logical access via digital authentication and single sign on to HR databases and directories, sales reporting, procurement systems, process documentation of loans/ mortgages, etc. Glass break detector Access controller IP fu Ultrasonic detector Prox and PIN reader IP wide dynamic camera Silent alarm button Intru Motion detectors Used to monitor the various zones insid a branch, from the ATM zone to customer and staff areas or offices, safes, etc. With multi-criteria signal analysis for high immunity to false alarms, and clever mirror technologies for superior detection. Seismic detectors Positioned inside ATMs, or directly in the wall structure near the machines or vaults. Alarms are triggered as soon as an attack on the machine or wall is detected, whilst environmental vibrations opening of the vault s door, ATM opera tional vibrations are reliably ignored. 9

10 Video surveillance SISTORE MX 3G s, SPC 5000 is ideal for onitoring. It offers: uthorised cards (SiPass cording (SISTORE MX 3G); or each branch d business requirements; ission to the ARC for cess rights changes to are available to support eople and values. With its UVV Kassen/Kalagate certification, this hybrid video recorder can adapt to bandwidth restrictions in support to other critical banking systems, and can read details of cards used to access ATM zones: event images are tagged with transaction data/time/date (15 minutes pre-/post-event recording). The event logbook is saved in a central, secure database. Enables access/intrusion event driven real-time recording on IP/analogue cameras, and hardware/software based network recording (resp. SISTORE MX 3G, NVS). ll HD dome Prox and PIN reader Dual technology detector Seismic detector IP Vandal resistant dome 09h00 The bank opens. The video surveillance system records continuously throughout the premises. Staff enter the interview rooms by badging their personal access cards to proximity readers. This simultaneously disables the motion detectors in the room, switches the lights on and triggers live video recording (potential evidence). 13h30 A customer claims he tried to withdraw cash from the ATM and was issued a receipt but no cash. With the SISTORE MX 3G DVR, the bank manager reviews the video footage tagged with the relevant transaction data, thereby confirming that the cash had not been dispensed. An engineer is called on site to investigate the problem. 15h00 The assistant manager notices the growing numbers of queuing customers via the video surveillance system. To reduce waiting times and free up counters for complex transactions, he sends staff to redirect customers needing simple transactions to ATMs and guide them through the self-service options. sion keypad e - Hybrid digital recorder Silent alarms The Intrunet hold-up foot rails and contacts enable a discreet alarm actuation. They can also be used to activate cameras. Door and window contacts These will alert staff closing the branch to any window or door left open, and will send an alarm should someone forcably open a door or window to break in. Control software SiPass integrated Software Cameras High-resolution models, to monitor till lines, queuing systems and recep tion/ enquiries desks, or near entrance areas to monitor customers exiting from the branch. Wide dynamic models for bright areas povide clear images both inside and looking at the outside. Day/night models in conjunction with infrared illumination for clear images 24 hours a day. 17h00 Closing time. CIT staff arrive to transfer the cash accumulated during trading. Video surveillance systems cover all their time on bank premises. The safe is then locked and the alarm activated in the area. The manager locks the front door. All security systems are activated ( traffic light system shows green). IP models for true digital transmission of streaming images. All our IP cameras are UVV Kassen certified. Vandal resistant domes For the monitoring of all building elevations, external fire exit doors, entrance points to the building and car parks/barriers. IP66 they can withstand a blow up to 1000 kg. Speed domes Can be moved with the utmost precision. Up to 36x optical zoom and 400 / sec preset speed. TFT/LCD/LED Displays With various sizes of screen and performance of display suitable for in a control room or as public display monitors. 10

11 Examples of security zones Office Money conveyor Zone protected by interlocked doors 24h zone Publicly accessible zone Customer zone Controlled customer zone General staff areas Vital technical installations Sensitive staff area Highest security area Counter customer safe Staircase Banking hall Wind screen Elevator Protect valuable assets and data Banks hold not just valuable cash, but also data and data storage devices, which, if removed from the premises will turn into a lucrative business for the criminals. Protecting access to offices and data rooms is therefore critical at branch level. Prox & PIN access readers positioned at strategic entrances will prevent unauthorised access to the areas, with attempts at forcible entry automatically triggering an alarm and video recording. Tags fitted to sensitive data storage devices, and linked to the access control system, can trigger an alarm if they are removed from the building without authorisation. Secure safes and deposit boxes To protect safes and deposit boxes, access control readers at entrances will stop members of the public accessing controlled areas. The wide range of readers from Siemens includes Prox & PIN models with duress code functionality (for instance when a member of staff is coerced to enter an area under threat). Seismic detectors fitted to safes and deposit boxes will trigger an alarm if forcible removal or access is attempted (particu-larly suitable for unmanned self-service deposit boxes, which make it possible for thieves to rent a box for the sole purpose of gaining easy access to the vault). This can be complemented with video surveillance for enhanced monitoring, with real-time video recording of images throughout the trading period and live recording on alarm after hours. Reduce cash-in-transit risks Cash-in-transit services remain a prime target for robbers. Significant invest- ments have been made to make the actual journey much safer, and this has shifted the focus towards the actual cash handover point in the bank itself. Conducting cash delivery or collection in the public area of banks, building societies and post offices also causes a degree of risk to public and staff safety. It is therefore essential that cash exchanges take place in secure areas (access controlled and fitted with video surveillance and alarms) or at times when no member of the public is present. Increase compliance through security More sophisticated security functionality can also contribute to compliance, enhancing transaction trail auditing by providing more advanced access control or alarm event reporting, and backed up with video recordings with time and date. For example, a recording system, linked to the bank s ATM system, can be set to record on certain conditions, e.g. if the card swiped to enter a 24h ATM zone is identified as being blocked or stolen. The video is then tagged and linked to the suspicious transactions, with pre- and post-event images also recorded. Maximise sales opportunities Security systems inside the premises should support both intervention and investigative activities, and raising the alarm should be easy and inconspicuous to prevent violent or panic reactions. By implementing interoperable security systems, local branches can strengthen well established bank security processes with a centralised even remote overview and control of all the security functionality and areas. This enables routine or incident scenarios to be translated into logical action/reaction between the access control, intrusion detection and video surveillance systems. Tighter security makes the branch less attractive to criminals: the resulting banking environment is safer for staff and customers, and therefore more conducive to fruitful business transactions. Highlights Turn branches into true sales centres by lightening the security burden for staff Enhance the customer s experience with a safer banking environment Reduce the risk of identity fraud at branch with physical data protection and verification tools Address higher risk areas with interoperating systems for the control of access, video monitoring and alarming Increase compliance with data protection and due diligence requirements 11

12 To achieve greater competitiveness on a national or even global level, banks need the flexibility to implement com-pany-wide business models that will optimise their margin levels and turnover. Whilst channel diversification is a key success factor, the challenges this brings for banks are multi-fold from consolidating payment channels whilst ensuring compliance across ever more complex networks of ATMs, branches, data centres and headquarters to promoting business intelligence sharing, and streamlining systems and processes. Interoperable security systems support more efficient enterprise-wide risk management strategies (ERM), by enabling banks to reduce the complexity of their processes and systems, at the same time facilitating an enterprise view of security across entire networks. Enterprise level security, compliance and global competitiveness National and global bank networks, data centres, bank headquarters, national gold reserves, central bank hubs. Enterprise level security In support to successful bank Enterprise Risk Management (ERM) strategies, security risks ought to be managed as a single end-to-end topic. Interoperable access control, intrusion detection, and video surveillance systems provide the tools to manage, monitor and report security risks and events as required by the legal framework. They can provide the sophisticated security functionality required to reduce losses stemming from the operational risks defined in the Basel II accord, at all levels of the service delivery channels network. They provide a central security platform for both compa-ny wide policies and the locally managed specific security issues pertaining to each channel. Support payment consolidation through improved data security Continuing competitive pressures are leading financial institutions to work towards consolidating payments to reduce handling costs. But with these payment hubs infrastructures that are capable of processing payment from multiple channels there is a growing potential for unauthorised access to even larger amounts of sensitive data for the purpose of manipulating, stealing or even destroying it. With increasingly stringent regulatory requirements, such as the Gramm-Leach-Bliley or Sarbane Oxley Acts, data centres should therefore be treated as high security buildings, and can therefore greatly benefit from interoperable systems. Applying a role-based access management to payment and data centres, is best achieved with centrally managed access rights as this ensures up-to-date access authorisation at all times for legitimate staff. Access events can be backed up with live or recorded visual verification of a person s identity on badging through video surveillance systems, whilst interoperation with alarm systems will enable the alert to be given should access to a restricted area be attempted by an unauthorised user. Role-based access management Tight access control to information and the systems holding them is a complex matter in a global banking world where the consolidation of the core systems used to manage the varied operational channels has only just started. Access control systems from Siemens can offer a one card answer for financial institutions that have locations nationwide or even worldwide. Instead of multiple cards or ID badges that would normally be needed to perform multiple functions (e.g. entry in building or electronic signatures) one card includes all these services. 12

13 Access control Intrusion detection Interoperable controllers SiPass integrated A true backbone for enterprise applications: distributed architecture for central/local event management, cardholder enrollment, data authentication and encryption, reporting and configuration changes; One card concept with role-based access to offices, IT networks/applications; anti-passback; visual verification; elevator control; HR system integration (LDAP compliance); overview of all access/alarm events with video footage back-up, accessible from SiPass software; full system archiving/restoration. SPC 6000 This scalable system facilitates centralis ment over standard communication ch back-up for reliable transmission. Individ can be programmed based on zones/ris port for alarm type specific intervention access control duress events). The use comfort keypad optimally supports stan tions as ATM or CIT Management with functions.. Interoperability in action national bank network A large bank has implemented a new nationwide security system to bring all local systems under one uniform and common standard. The objective is to reduce the costs of security systems themselves, but also to close any security gaps, particularly with data access and reporting capability. Central to the system is role-based access management, supported by a SiPass integrated access control system, which integrates into the bank s standard IT environment and HR database applications. The system is configured to work across the bank s corporate domain, ensuring the network integrity is not compromised. The system forms the basis of an enterprise wide interoperable security system also including SPC 6000 intrusion detection system and SISTORE CX video codec recording from which all security functionality can be managed and controlled. The entire bank network is in turn linked to an MM8000 Danger Management System, which facilitates the management of data from various sub-systems, including fire detection systems. The SiPass integrated system manages the access rights and cardholder data of over 3000 staff from the bank s central security and safety hub located at it s general headquarters. The one card concept supported by SiPass integrated (combining physical access rights and digital sign-on) has been implemented in all sites: changes to access management policies can now be rolled out automatically, ensuring consistent access restrictions to sensitive areas, business data or applications across all sites and employees. Self-service points Intrusion Detection Video Surveillance Local branches Emergency response services Intrusion Detection Video Surveillance Access Control Executive management homes Intrusion Detection Video Surveillance Field devices Proximity and PIN reader with a robust design and metal casing for vandal resistance. Proximity readers Ideal for controlling access to doors in offices. Smart card technology Enables physical access rights to be combined with logical access via digital authentication and single sign on to HR databases and directories, sales reporting, procurement systems, process documentation of loans/mortgages, etc. External motion detectors Siemens external motion detectors enable an alarm to be triggered as soon a intruders set foot on restricted outdoor areas, allowing for intervention to take place before access to critical areas or assets has been gained. Internal motion detectors The range of Siemens internal motion detectors caters for all bank environments: from 24-hour zones to retail branches and data centres. The range covers requirements for all grades of risk areas, and offers the high est detection rate and false alarm immunity. 13

14 Video surveillance SISTORE CX ed alarm manageannels with IP/GSM ual security settings k levels, with supprocedures (e.g. r interface with dard bank applicaintegrated banking Kalagate certified, this codec recorder supports distributed systems e.g. a unit per branch or building all connected to a central control room, and provides: fast transmission/ streaming of the highest quality video, centralised storage of recordings for secure archiving (NAS); bandwidth management tools; advanced search functionality (addressing legal requirements to report security events with supporting information); back-up of business critical security data; perimeter surveillance capability (SISTORE CX EDS/ODR). Central control for regional HQ Central control for branches Regional headquarters Intrusion Detection Video Surveillance Access Control National headquarters Intrusion Detection Video Surveillance Access Control Data/cash centre Central control for national HQ Central Control danger management (MM8000) for entire network Intrusion Detection Video Surveillance Access Control In line with security breaches reporting requirements, any suspicious event flagged up in local systems can also be accessed, managed and reported both locally and in the central SiPass database. Similarly, the SPC 6000 Macro functionality enables consistent alarm settings across all sites, with for example safes being set in all branches under constant alarm monitoring, with bypass only accessible to authorised holders of special codes. Specific event types can also be defined to trigger video recording or alarm activation/ deactivation based on established business scenarios and risk levels that are common to all sites. The SISTORE CX codec recording system enables the centralised management of local video recorders in branches through its virtual matrix functionality. This enables locally recorded critical event footage to be centrally and securely archi ved away from the branch. All sites are equipped with SISTORE CX EDS for outdoor video motion detection and SISTORE CX ODR to e.g. detect any unauthorised parking in front of bank branches. The SiPass software provides a central control point for all security functionality, enabling remote access to local intrusion event log or to conduct live viewing, playback and recording of images based on access or intrusion events, overlaid on user-friendly graphical site maps. s Secure intrusion keypad The stylish keypad enables quick and simple multi-partition operation. Key switch and annunciation modules offer additional security levels and parallel partition indication and operation, as well as unique tamper detection concepts. High resolution cameras Offering the highest detailed images for evidential use, the range of super high-resolution models are ideal for the monitoring of main entrance points to each floor, lifts, lobbies and staircase/ fire exits. Vandal resistant domes For the monitoring of all elevations of the buildings, external fire exit doors, all entrance points to the building and car parks/barriers. IP66 they can withstand a blow up to 1000 kg. security TFT displays offers features such as anti-glare security glass. Control keyboards Able to control both the digital recording system and speed domes, the CKA range of keyboards offers ease of control and flexibility particularly when using the variable proportional joystick. - TFT/LCD/LED displays Typically used to create video walls for use in a control room the range of 14

15 In a SOX and Basel II context, this ensures that identity and access rights are up to date and traceable and that security breaches are reportable at all times. Replicate security best-practices Interoperable systems provide the means to access and manage intrusion detection, access control and video surveillance data and processes centrally, thereby facilitating the implementation of streamlined security measures and procedures. This also enables best practices to be identified and shared throughout the network. With all the security data collected centrally and easily retrievable, a bank can keep an ongoing watch on all its activities within and across sales channels. This translates into more efficient bank channel integration, ensuring that all channels are communicating with one another and seamlessly sharing security-related information, so tracking of suspicious account activity and cash can occur simultaneously, raising red flags if something goes wrong. Protect IT and data networks integrity IT integration sits high on banking institutions strategic agendas, in the search for more efficient and transparent ways of managing and protecting data and business processes. Compliance requirements have permeated to IT networks used by financial institutions, calling for secured back-up of critical data for example. Interoperable security ystems from Siemens can sit on their own network, ensuring they will not compromise the network integrity. In addition, they deliver sophisticated reporting tools, which allow for event logs and recorded video to be exported over secure connection to centralised data centres, away from the branch. The compliance success factor Interoperable security systems, by providing banks with an enterprise level view of all security-related matters, can contribute to improve compliance levels, on the one hand by helping to prevent cardholders financial and personal information from being compromised or misused, and on the other, by providing the tools to implement a successful role-based access management to sensitive data or assets. More specifically, in a context where banks are legally required to fully disclose all events that are material to the business and report all security breaches (Basel II third pillar) being able to back-up transaction data with authenticated video recordings and access and alarm event reporting brings significant advantages from an auditing process perspective. Security in support to business intelligence With centralised monitoring of sites, and integration into a bank s operational systems, bank headquarters can achieve better understanding of their proximity businesses (be it ATMs or branches), thereby improving the efficiency of their network. On a national scale, the added visibility brought about by interoperable systems also enables a more efficient staff deployment across multiple branches, based, for example, on changing business activity levels in branches, or the need to transfer skilled staff to Highlights Harmonised security concept across entire bank network improves the efficiency of security strategy and reduces the total cost of system ownership Certified products and systems contribute to better insurance compliance Understand and react to security breaches more readily with holistic approach to security Common security user interface facilitates cost-effective staff deployment across multiple branches Protect IT network integrity with certified electronic security systems 15

16 Siemens has won one of the largest security contracts in Norway a complete security and services solution agreement with SpareBank1, an alliance of 23 banks and 350 offices that together make one of the largest providers of financial products and services in the Norwegian market with 460 branches. The bank wanted a fail-safe and sophisticated security solution with a central system operation and maintenance that involves the upgrading of video surveillance, intrusion detection and access control systems and therefore provides increased security against unauthorised access and criminal activities in all 460 branches. Case study: Siemens improves security for SpareBank1 across 460 branches Highlights 333x SISTORE digital video recorders (SISTORE MX 3G with 2 TB hard drives for all branches, and SISTORE AX4 Lite for most of the ATM machines) Replacement of 1,385 cameras with Siemens models 420x SI410/SI220 intrusion panels securing most branches and 2,236 motion detectors from Siemens 1,300 doors across all branches secured by SiPass integrated access control systems and readers 16 The challenge Each of the 23 member banks which together constitute one of the most familiar names in the Norwegian financial market ran their own security systems and services locally. Although the alliance s main goal was to ensure the individual banks independence and local connections, the objective of the agreement was to create a mutually binding co-operation between the partners within the security operation, focusing on security levels, cost optimisation and the development of predictable security levels and services throughout the alliance. The answer All branches within the bank network will have video surveillance and intrusion alarm systems installed, with the majority of the branches also supplementing their security measures with access control. A centralised access control system utilising operational services (with server hosting at Siemens MARC station for 23 branches), is also being specified. The alarm management services respond to all types of alarms (both life-threatening and everyday events), thereby contributing to business continuity, crime prevention, staff safety and, ultimately, providing peace of mind. The centre will manage information from all locations, offer support on technical questions, receive service calls and remotely manage the security systems. The result Key to the requirements was the implementation of an interoperable security system that is capable of working together to deliver the required security levels. This enables the control of the various security functionalities (access control, intrusion detection, video surveillance, alarm management) from one central point. For example, whenever events trigger access or intrusion alerts, video recording will start and live images will be received to provide verification at the MARC from where, if necessary, intervention forces will be alerted. In rerouting existing alarm transmission to the MARC, several areas for improvement in the customer s existing system were identified, all of which have been addressed by the new system.

17 Systems overview Access control Intruder detection Video surveillance Remote monitoring Retail bank (local branch) Self-service SiPass Single Door Products DC800 controller and access reader SiPass Entro Up to 512 doors/40,000 cardholders Both systems provide a bank lobby function (white list) that uses the customers bank cards to provide access to the self-service area. SiPass Entro Easy integration with video surveillance/intrusion systems Multi-site concept Easy software maintenance via terminal server support SiPass integrated For system expansion from SiPass Entro For larger retail banks SPC areas The system provides flexible alarm transmission and verification SPC 5000 SMS event messaging Supports audio and video alarm verification Vectis HX - Hybrid recording - Automatic backup - Connection of ATMs, barcode scanners and cash register for easy search - Full HD / HDMI interface / H.264 recording SISTORE MX 3G Hybrid recording Support of main ATM interfaces Event callback Via Alarm Receiving Centre Own or outsourced control room SiPass integrated Virtually unlimited number of doors/cardholders Mutiple workstations Visitor management Integrates with HR databases High security bank features: duress codes, dual custody and integration of biometric identification SPC areas Easy system customisation for banks Highly scalable Fully networkable Flexible alarm transmission and verification SMS event messaging SISTORE CX Virtual matrix for centralised operation Out-/indoor video analytics surveillance Event callback with alarm picture Own or outsourced control room (SiPass integrated, MM8000 DMS or IVM danger/video management) Magnetic stripe readers (with or without keypads) Ex ternal PIR motion detectors (perimeter surveillance with alarm triggered video recording) Indoor All in one camera BGV-approved Proximity readers (with or without keypads) Internal motion detectors (wired or wireless. For ATM zones, counters, back-offices, safe areas, etc.) High-resolution analogue and IP cameras Vandal resistant domes Field devices Hands-free Cotag readers Seismic detectors (safes, vaults or ATMs protection) TFT/LCD displays Smart card readers (with or without keypads) Glass break detectors (wired or wireless) Control keyboards (control virtual matrix via IVM) Door/window contacts (wired or wireless) Vectis HX Control Keyboard, for control of Vectis HX and SISTORE AX * The information contained in this table is only meant as a guide. Other combinations are possible. 17

18 Siemens AB Siemens AG Industry Sector Industry Sector Building Technologies Division Building Technologies Division Security Products Fire Safety & Security Products Englundavägen 7 Siemensallee 84 Box Karlsruhe, Solna Germany Sweden Tel. +49 (721) Tel: Fax: +49 (721) Fax: Siemens plc I BT Security Products Suite 7, Castlegate Business Park Caldicot South Wales NP26 5AD UK The information in this document contains general descriptions of technical options available, Main: +44 (0) which do not always have to be present in individual cases. The required features should therefore Fax: +44 (0) be specified in each individual case at the time of closing the contract. The information in this document contains general descriptions of technical options available, which do not always have to be present in individual cases. The required features should therefore be specified in each individual case at the time of closing the contract. Siemens AB 2013 Siemens AB products

www.siemens.com/security products Siemens AB Siemens AG Industry Sector Industry Sector Building Technologies Division

www.siemens.com/security products Siemens AB Siemens AG Industry Sector Industry Sector Building Technologies Division Siemens AB Siemens AG Industry Sector Industry Sector Building Technologies Division Building Technologies Division Security Products Fire Safety & Security Products Englundavägen 7 Siemensallee 84 Box

More information

Bank security. Adding value through operational risk management. Answers for infrastructure.

Bank security. Adding value through operational risk management. Answers for infrastructure. Bank security Adding value through operational risk management Answers for infrastructure. A new dimension to banking security Faced with today s market uncertainty, banks and financial institutions are

More information

SECURITY SOLUTIONS BANKING AND FINANCE

SECURITY SOLUTIONS BANKING AND FINANCE SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

Retail security. Improve retail profitability and operational performance. Answers for infrastructure. Medium to large sized applications

Retail security. Improve retail profitability and operational performance. Answers for infrastructure. Medium to large sized applications Retail security Improve retail profitability and operational performance Medium to large sized applications Answers for infrastructure. 1 Effective loss prevention through multi-layered retail security

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Think Remote Monitoring Think Concept Pro Think VXM4B

Think Remote Monitoring Think Concept Pro Think VXM4B The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

CCTV. SISTORE MX the hybrid video surveillance system for up to 32 cameras. Answers for infrastructure.

CCTV. SISTORE MX the hybrid video surveillance system for up to 32 cameras. Answers for infrastructure. CCTV the hybrid video surveillance system for up to 32 cameras Answers for infrastructure. A new Dimension of surveillance is a hybrid video surveillance system capable of recording both IP and analogue

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

Access Control, Integrated

Access Control, Integrated Access Control, Integrated An essential guide to integration of your security systems and the benefits that can bring Duncan Gooch Product Manager Copyright 2011 Time and Data Systems International Limited

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

View. Select View Managed Video Services ADT

View. Select View Managed Video Services ADT monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance

More information

COMITÉ EUROPÉEN DES ASSURANCES

COMITÉ EUROPÉEN DES ASSURANCES COMITÉ EUROPÉEN DES ASSURANCES SECRETARIAT GENERAL 3bis, rue de la Chaussée d'antin F 75009 Paris Tél. : +33 1 44 83 11 73 Fax : +33 1 44 83 11 85 Web : cea.assur.org DELEGATION A BRUXELLES Square de Meeûs,

More information

Retail security. Improve retail profitability and operational performance. Answers for infrastructure. Small to medium sized applications

Retail security. Improve retail profitability and operational performance. Answers for infrastructure. Small to medium sized applications Retail security Improve retail profitability and operational performance Small to medium sized applications Answers for infrastructure. Effective loss prevention through multi-layered retail security Crime

More information

Security Master Plan and Standard for Yuba Community College District

Security Master Plan and Standard for Yuba Community College District Security Master Plan and Standard for Yuba Community College District Submitted by: Christopher S.M. Wilkinson Chief of Police Yuba Community College District Page 1 SECTION 1.0 INTRODUCTION The Yuba Community

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Watching Your Business Fire & Security Solutions

Watching Your Business Fire & Security Solutions Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Axis network cameras A wide portfolio of products for professional video surveillance.

Axis network cameras A wide portfolio of products for professional video surveillance. Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public

More information

Advanced Network Video And Alarm Management Suite

Advanced Network Video And Alarm Management Suite Advanced Network Video And Alarm Management Suite ViMS. Advanced Network Video & Alarm Management Suite G anz ViMS Command is a powerful IP network based, open standards Video & Alarm Management software

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Axis IP surveillance. Endless possibilities for video surveillance.

Axis IP surveillance. Endless possibilities for video surveillance. Axis IP surveillance. Endless possibilities for video surveillance. The video surveillance market is growing constantly, driven by increased public and private security concerns, as well as a technology

More information

Intrusion. IC60 security meets design. Answers for infrastructure.

Intrusion. IC60 security meets design. Answers for infrastructure. Intrusion IC60 security meets design Answers for infrastructure. 1 Welcome home There is no better feeling than knowing your loved ones and your home are safe. Now imagine if you could improve both your

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Retail Solutions. Why Tyco Security Products for Retail?

Retail Solutions. Why Tyco Security Products for Retail? Retail Solutions Why Tyco Security Products for Retail? We are a leading provider of integrated retail security solutions, deployed today at more than 80 percent of the world s top 200 retailers. Tyco

More information

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Technology driven security

Technology driven security Technology driven security The heart of our approach to security is innovation and being resilient to risk. Our priority is to work in partnership with our clients to deliver technologydriven, future-proofed

More information

XIGHTOR DOOR ENTRY SYSTEM. Company Name company address line 1 company address line 2 www.schneider-electric.com

XIGHTOR DOOR ENTRY SYSTEM. Company Name company address line 1 company address line 2 www.schneider-electric.com DOOR ENTRY SYSTEM SE002-0115-00 Schneider Electric - All rights reserved Company Name company address line 1 company address line 2 www.schneider-electric.com As standards, specifications and designs change

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

How can we prevent security breaches?

How can we prevent security breaches? How can we prevent security breaches? Unify your security management with Siveillance Vantage to enhance the emergency and routine procedures of your critical infrastructure. Answers for infrastructure.

More information

Tradition of quality and innovation

Tradition of quality and innovation Bosch Security Systems 130 Perinton Parkway Fairport, New York 14450 phone: 800.289.0096 fax: 585.223.9180 www.boschsecurity.us All rights reserved Printed in U.S.A. Part # F01U008588B Tradition of quality

More information

ASERIES ATM Access Management System

ASERIES ATM Access Management System ASERIES ATM Access Management System Increase Security. Reduce Operation Costs. Reduce Liability. The A-Series ATM Access Management System from Sargent & Greenleaf increases security and management efficiency

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT As a fast growing solution provider, ACTi is dedicated to manufacturing state of the art IP video surveillance technology and providing end-to-end

More information

Appropriate response: A guide to security system integration, monitoring and verification

Appropriate response: A guide to security system integration, monitoring and verification Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm

More information

Understanding Alarm Systems

Understanding Alarm Systems Understanding Alarm Systems A false alarm occurs when an alarm signal designed to elicit an immediate emergency Law Enforcement, Fire, or Medical response is activated, when in fact no emergency exists.

More information

ATM Video Surveillance

ATM Video Surveillance ATM Video Surveillance with centralized video management Secure your ATMs with robust and reliable video surveillance solution Record record H.264 compressed video using less hard disk space Search search

More information

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential

More information

NX-10-V3 wireless system. To wire or not to wire?

NX-10-V3 wireless system. To wire or not to wire? NX-10-V3 wireless system To wire or not to wire? Now your security goes where you go Our NX-10-V3 system is fully wireless with a keypad in a designer housing. The hybrid series goes where no security

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

The remote CCTV monitoring specialists CCTV Monitoring

The remote CCTV monitoring specialists CCTV Monitoring The remote CCTV monitoring specialists CCTV Monitoring Providing security and total peace of mind 24 hours a day, 365 days a year! Welcome to Valleywatch Valleywatch is a specialist CCTV monitoring station

More information

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co.

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co. Safety & Security VeriSafe Intruder Alarms Fire Alarms Access Systems CCTV Systems Keeping people safe & businesses compliant www.veriserv.co.uk Security is about more than complying with standards and

More information

Building Technologies

Building Technologies Building Technologies TELSCAN Web Server - Fast ethernet transmission of the highest quality images: Get your pictures anywhere. Compact, standalone system for easy rem Siemens is one of the largest and

More information

ATM FRAUD AND COUNTER MEASURES

ATM FRAUD AND COUNTER MEASURES ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility

More information

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS A Winning Combination Unlock the Possibilities! Typical Applications Office Buildings Day Care Centres Pharmacies

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

BRANCH SECURITY REVIEW CHECKLIST

BRANCH SECURITY REVIEW CHECKLIST BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.

More information

OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED. With Optus Contact Centre As a Service (CCaaS)

OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED. With Optus Contact Centre As a Service (CCaaS) OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED With Optus Contact Centre As a Service (CCaaS) CONTENTS ARE YOU READY FOR YOUR CUSTOMERS? 02 THERE S A BETTER WAY 02 HOW CCaaS

More information

Comprehensive Security with one Powerful System. G Series integrated security, fire and access control panels

Comprehensive Security with one Powerful System. G Series integrated security, fire and access control panels Comprehensive Security with one Powerful System G Series integrated security, fire and access control panels 2 3 Designed for Flexibility Bosch s G Series panels provide the ultimate in security controls

More information

Contents. Introduction. Basic use... pg 3. App settings: Main Menu... pg 6. App settings: Profile Sub-menu... pg 7

Contents. Introduction. Basic use... pg 3. App settings: Main Menu... pg 6. App settings: Profile Sub-menu... pg 7 USER GUIDE PanicGuard 2014 2 Contents Basic use... pg 3 How and when to use PanicGuard App settings: Main Menu... pg 6 A brief guide to contacts, wallpapers and other customisable settings App settings:

More information

Kaba EACM The SAP module for efficient access organisation

Kaba EACM The SAP module for efficient access organisation The SAP module for efficient access organisation THINK 360 Secure Holistic Simple THINK 360 Security can be this simple Lean and efficient organisation processes are more important today than ever. Yet

More information

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM Your Connected Business LYNX Touch Protected and Connected Honeywell s LYNX Touch self-contained business

More information

Security Guidelines for Premises Storing/Handling Security Sensitive Materials (SSMs) A-1

Security Guidelines for Premises Storing/Handling Security Sensitive Materials (SSMs) A-1 Security Guidelines for Premises Storing/Handling Security Sensitive Materials (SSMs) S/N Area of Interest Description Recommended Measures 1 Perimeter Security Perimeter barriers Perimeter barriers are

More information

a guide to integrated security management systems March 2007 For other information please contact:

a guide to integrated security management systems March 2007 For other information please contact: a guide to integrated security management systems March 2007 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk

More information

GE Security Alliance. imagination at work

GE Security Alliance. imagination at work GE Security Alliance Imagine your alarm, access control and video surveillance systems operating in perfect alliance as part of a truly integrated and cohesive security system. No need to imagine any longer.

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

Physical Security Policy Template

Physical Security Policy Template Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your

More information

MM8000 highest safety and security with intelligent danger management

MM8000 highest safety and security with intelligent danger management MM8000 highest safety and security with intelligent danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive

More information

Destiny 4100. Destiny 4100. Owners Manual

Destiny 4100. Destiny 4100. Owners Manual Destiny 4100 Destiny 4100 Owners Manual TABLE OF CONTENTS INTRODUCTION Control Panel...3 Detection Devices...3 Telephone Keypads...3 GLOSSARY... 4-5 LOCAL PHONE ACCESS Using Your Telephones As Keypads...6

More information

Why Use Cisco Network Storage Systems for Your Business

Why Use Cisco Network Storage Systems for Your Business Why Use Cisco Network Storage Systems for Your Business Introduction This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

SaaS architecture security

SaaS architecture security Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008 EBF ref. 2283 Brussels, November 2008 16 th European Report on Bank Robberies Executive Summary The problem of robberies is constant and will remain as long as money exists. Recently, countries have had

More information

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.

More information

Security for Railways and Metros

Security for Railways and Metros Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,

More information

XProtect clients Access your surveillance

XProtect clients Access your surveillance XProtect clients Access your surveillance Three ways to view video surveillance For easy access to video surveillance, Milestone offers three flexible user interfaces: XProtect Smart Client, XProtect Web

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

Comprehensive Video Solutions & Services. Industry-leading video solutions for your business

Comprehensive Video Solutions & Services. Industry-leading video solutions for your business Comprehensive Video Solutions & Services Industry-leading video solutions for your business STANLEY VIDEO SURVEILLANCE & SERVICES Gaining visibility and insight into your business can be a challenge. Whether

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Requirements. for. CCTV Installation

Requirements. for. CCTV Installation PSA 2006_12 Requirements for CCTV Installation Table of Contents Page No. 1. Introduction...3 2. Normative References...3 3. Definitions...4 4. Overview...6 5. Location Survey...6 6. System Design...6

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control

More information

HIGHLY SOPHISTICATED MONITORING

HIGHLY SOPHISTICATED MONITORING PERFECTLY PROTECTED HIGHLY SOPHISTICATED MONITORING Yachts are masterpieces of design and technology with thousands of functions providing the highest level of comfort. Besecke s automation and circuitry

More information

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks. BANKING AND FINANCE Advanced technology solutions to maximize the security of financial institutions and branch banks. advisory services. technology delivery. SmartSourcing SM managed services. www.sdisolutions.com

More information

P2000 SECURITY management SYSTEM. More control means more freedom

P2000 SECURITY management SYSTEM. More control means more freedom P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant

More information